First published: Wed Sep 21 2016(Updated: )
Use-after-free vulnerability in the FIFO event channel code in Xen 4.4.x allows local guest OS administrators to cause a denial of service (host crash) and possibly execute arbitrary code or obtain sensitive information via an invalid guest frame number.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.4.0 | |
Xen xen-unstable | =4.4.1 | |
Xen xen-unstable | =4.4.2 | |
Xen xen-unstable | =4.4.3 | |
Xen xen-unstable | =4.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7154 is rated as high severity due to its potential to cause a denial of service or arbitrary code execution.
To fix CVE-2016-7154, you should update your Xen hypervisor to version 4.4.5 or later.
CVE-2016-7154 affects local guest OS administrators running Xen versions 4.4.0 through 4.4.4.
CVE-2016-7154 enables local guest OS administrators to potentially crash the host or execute arbitrary code.
Xen versions 4.4.0, 4.4.1, 4.4.2, 4.4.3, and 4.4.4 are vulnerable to CVE-2016-7154.